How long does integration take, and what does it require?
Most teams complete initial integration in days. You connect your job ingress to the dirigeX.AI routing endpoint, register your agents and capability mappings, and configure initial policy. We handle infrastructure provisioning and control plane setup. The pilot is bounded — a specific set of job types and agents — so you validate behavior before expanding.
What is the deployment risk of introducing a new control layer?
dirigeX.AI is fully managed — there is no new infrastructure for your team to operate or maintain. Pilot scope is agreed in advance: a bounded set of jobs and agents, with routing behavior verifiable before any production expansion. Nothing routes through dirigeX.AI until your team has confirmed results.
How does dirigeX.AI support governance and legal scrutiny?
Each routing decision produces a structured, Merkle-anchored record of the agent selected, trust evidence used, policy state active, and execution outcome. It is independently verifiable — not operator-asserted. This is evidence that survives regulatory inquiry, internal audit, and legal discovery. We produce proof, not posture.
Does a routing control plane introduce meaningful latency?
Routing resolution adds bounded, deterministic overhead — not proportional to agent graph complexity. For most production workloads, this is negligible relative to agent execution time. Exact figures are measurable during pilot evaluation under your actual traffic profile. We do not publish synthetic benchmarks.
Who owns the system after rollout, and what does change management look like?
dirigeX.AI is operated by your platform team, with governance visibility surfaced to compliance stakeholders through the admin console. Your team owns agent definitions, capability mappings, and policy configuration. We own control plane infrastructure and uptime. Boundaries are explicit and do not shift post-deployment.
How does dirigeX.AI handle a new agent with no execution history?
New agents enter shadow routing on registration. They execute on real production traffic in parallel with active decisions, accumulating verified performance evidence without influencing live routing outcomes. Shadow assignment is deterministic — no sampling bias in the evidence cohort. Once the observation threshold is met, the agent becomes eligible for trusted routing. No agent routes as trusted on day one. That is an architectural guarantee, not a policy default.
What does a routing decision audit trail actually look like in practice?
A single structured document per decision: the job envelope, manifest version resolved, agent selected and eligibility basis, Merkle-anchored trust snapshot, execution outcome and schema validation result, and the full policy state at decision time. Not a log chain to reconstruct manually — a self-contained, verifiable record.
How is this different from adding observability tooling to our existing stack?
Observability records what happened. dirigeX.AI governs what happens and produces proof that governance was structurally active. Tracing and logging record that an agent ran; dirigeX.AI proves why it was selected, verifies the trust evidence was sound, and is designed to ensure core governance controls were architecturally enforced — not just configured. The distinction matters most when defending a decision to an auditor, not debugging it internally.
What do we need to provide to start a pilot?
Four inputs: the set of job types you want routed, the agents you want to register with their declared capabilities, your initial policy requirements, and a designated platform engineering contact. We handle provisioning, routing infrastructure, admin console setup, and support throughout the pilot period.
Who controls governance policy — your team or dirigeX.AI?
Your team owns governance policy entirely. dirigeX.AI provides the enforcement architecture, the configuration tooling, and the evidence that policies were structurally enforced. Policy gates, approval rules, routing overrides, and eligibility controls are configured by your designated operators. We do not set or modify your governance policy. The platform is designed to enforce it as you configure it — and to produce independently provable evidence that it was.